RULE(RULE ID:337833)

Rule General Information
Release Date: 2024-03-05
Rule Name: JumpServer Password Reset Vulnerability (CVE-2023-42820)
Severity:
CVE ID:
Rule Protection Details
Description: JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference: https://github.com/jumpserver/jumpserver/commit/42337f0d00b2a8d45ef063eb5b7deeef81597da5
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7prv-g565-82qp
https://cxsecurity.com/cveshow/CVE-2023-42820/
Solutions
Refer to the announcement or patch by the vendor: https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7prv-g565-82qp